CVE-2020-27279
📋 TL;DR
A NULL pointer dereference vulnerability in Crimson 3.1 protocol converter allows attackers to cause denial of service by sending specially crafted packets that reboot affected devices. This affects industrial control systems running Crimson 3.1 software prior to build 3119.001. The vulnerability requires network access to the device.
💻 Affected Systems
- Red Lion Crimson 3.1
📦 What is this software?
Crimson by Redlion
⚠️ Risk & Real-World Impact
Worst Case
Persistent denial of service through repeated device reboots, disrupting industrial processes and potentially causing safety incidents or production downtime.
Likely Case
Temporary service disruption through device reboot, requiring manual intervention to restore normal operation.
If Mitigated
No impact if devices are patched or network access is properly restricted.
🎯 Exploit Status
Exploitation requires sending specially crafted packets to the vulnerable protocol converter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Build 3119.001 or later
Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-21-005-04
Restart Required: Yes
Instructions:
1. Download Crimson 3.1 build 3119.001 or later from Red Lion support portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart affected devices. 5. Verify successful update.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices in separate network segments with strict access controls.
Firewall Rules
allImplement firewall rules to restrict access to protocol converter ports from untrusted networks.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable devices from untrusted networks.
- Deploy intrusion detection systems to monitor for suspicious packets targeting the protocol converter.
🔍 How to Verify
Check if Vulnerable:
Check Crimson 3.1 build version in software interface or device properties.
Check Version:
Check Crimson 3.1 software version in the application interface or device configuration.
Verify Fix Applied:
Verify Crimson 3.1 build version is 3119.001 or later and test protocol converter functionality.
📡 Detection & Monitoring
Log Indicators:
- Unexpected device reboots
- Protocol converter error messages
- Connection attempts to protocol converter ports
Network Indicators:
- Unusual packets to protocol converter ports
- Multiple connection attempts from single sources
SIEM Query:
source_ip = [external] AND dest_port = [protocol_converter_port] AND packet_size = [suspicious_size]